A convertible authenticated encryption scheme allows a designated receiver to recover and verify a message simultaneously, during which the recipient can prove the dishonesty of the sender to any third party if the sender repudiates her signature later. In this paper, after showing some weaknesses in Wu and Hsu [T. Wu, C. Hsu, Convertible authenticated encryption scheme. The Journal of Systems and Software 62 (2002) 205–209] and Huang and Chang [H. Huang, C. Chang, An efficient convertible authenticated encryption scheme and its variant, in: Proceedings of the ICICS2003-Fifth International Conference on Information and Communications Security, Springer-Verlag, LNCS 2836, 2003, p. 382] convertible authenticated encryption schemes, we propose...
Authenticated encryption schemes allow the signer to generate an authenticated ciphertext such that ...
Recently, Tseng et al. proposed an authenticated encryption scheme using self-certified public keys....
[[abstract]]In this paper, we first adopt the concept of self-certified public keys to propose a new...
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a m...
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a m...
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a m...
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a m...
kkj AT icu.ac.kr A convertible authenticated encryption scheme allows a designated receiver to recov...
The digital signature provides the functions of integration, authentication, and non-repudiation for...
This paper proposes a provable secure scheme for convertible authenticated encryption. The scheme al...
In this article, we present an authenticated encryption scheme with message linkages used to deliver...
[[abstract]]In this article, we present an authenticated encryption scheme with message linkages use...
The digital signature provides the signing message with functions like authentication, int...
[[abstract]]"A convertible authenticated encryption scheme allows a designated receiver to retrieve ...
In this paper we propose a convertible authenticated encryption scheme. To show our proposed scheme ...
Authenticated encryption schemes allow the signer to generate an authenticated ciphertext such that ...
Recently, Tseng et al. proposed an authenticated encryption scheme using self-certified public keys....
[[abstract]]In this paper, we first adopt the concept of self-certified public keys to propose a new...
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a m...
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a m...
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a m...
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a m...
kkj AT icu.ac.kr A convertible authenticated encryption scheme allows a designated receiver to recov...
The digital signature provides the functions of integration, authentication, and non-repudiation for...
This paper proposes a provable secure scheme for convertible authenticated encryption. The scheme al...
In this article, we present an authenticated encryption scheme with message linkages used to deliver...
[[abstract]]In this article, we present an authenticated encryption scheme with message linkages use...
The digital signature provides the signing message with functions like authentication, int...
[[abstract]]"A convertible authenticated encryption scheme allows a designated receiver to retrieve ...
In this paper we propose a convertible authenticated encryption scheme. To show our proposed scheme ...
Authenticated encryption schemes allow the signer to generate an authenticated ciphertext such that ...
Recently, Tseng et al. proposed an authenticated encryption scheme using self-certified public keys....
[[abstract]]In this paper, we first adopt the concept of self-certified public keys to propose a new...